-
1561
Quantum Circuit Synthesis Using Fuzzy-Logic-Assisted Genetic Algorithms
Published 2025-03-01“…Therefore, interest has grown towards heuristics-based synthesis techniques, which are able to produce approximations of the desired algorithm, while optimizing depth and gate-count. In this work, we investigate using genetic algorithms (GA)—a proven gradient-free optimization technique based on natural selection—for circuit synthesis. …”
Get full text
Article -
1562
FDR coding and decoding algorithm for reliable transmission in underwater acoustic network
Published 2020-04-01“…By analyzing the shortcomings of RLT coding and decoding algorithm,a filtering dimension reduction (FDR) algorithm was proposed,which eliminated the waiting time of the traditional decoding algorithm and achieves fast decoding.In addition,XOR operation between encoded packages effectively increased the number of one-degree encoded packages,and improved decoding probability while reducing transmission delay.An optimized degree distribution function for FDR decoding algorithm was proposed,which increased the proportion of two-degree,three-degree and four-degree encoded packages,further increased the probability of one-degree packet,so that speeded up the decoding progress.Simulation results with NS3 show that the decoding success probability of FDR algorithms higher than RLT algorithm.…”
Get full text
Article -
1563
EAQR: A Multiagent Q-Learning Algorithm for Coordination of Multiple Agents
Published 2018-01-01“…Experimental results show that EAQR outperforms the other algorithms in the box-pushing problem and achieves the theoretical optimal performance in the distributed sensor network problem.…”
Get full text
Article -
1564
Case Study of Genetic Algorithms in Metrology: Assessment of Inter-laboratory Comparisons
Published 2025-01-01“…The Genetic Algorithm (GA), a novel optimization-based approach, demonstrates exceptional resilience to outliers. …”
Get full text
Article -
1565
Scalable PBFT-like algorithm for trust management of degree/graduation certificates
Published 2024-09-01“…Analysis and simulation experiments demonstrate that the proposed algorithm ensures security while achieving higher throughput and scalability in large-scale applications of degree/graduation certificate trust management.…”
Get full text
Article -
1566
Bias-field digitized counterdiabatic quantum optimization
Published 2025-04-01“…We introduce a method for solving combinatorial optimization problems on digital quantum computers, where we incorporate auxiliary counterdiabatic (CD) terms into the adiabatic Hamiltonian, while integrating bias terms derived from an iterative digitized counterdiabatic quantum algorithm. …”
Get full text
Article -
1567
Mine underground object detection algorithm based on TTFNet and anchor-free
Published 2024-11-01“…To solve the problem of poor object detection effect caused by uneven light and high noise in underground mines, this study proposes a TTFNet (training-time-friendly network)-based object detection algorithm for underground mines. First, CenterNet and TTFNet algorithms are introduced, then pooling is introduced into CSPNet basic structure to design a lightweight feature extraction network, at the same time optimizing the feature fusion way in the original algorithm, optimizing residual shrinkage network structure, and introducing it into object detection task. …”
Get full text
Article -
1568
Observation optimization for marine target tracking by airborne and maritime unmanned platforms cooperation using adaptive enhanced dung beetle optimization
Published 2025-07-01“…Existing research predominantly focuses on homogeneous platform cooperative observation optimization under random error influences, while neglecting the collaborative optimization challenges of heterogeneous platforms affected by systematic errors. …”
Get full text
Article -
1569
Hybrid Denoising Algorithm for Architectural Point Clouds Acquired with SLAM Systems
Published 2024-12-01“…This work presents the implementation of a denoising algorithm for point clouds acquired with LiDAR SLAM systems, aimed at optimizing data processing and the reconstruction of surveyed object geometries for graphical rendering and modeling. …”
Get full text
Article -
1570
N-Dimensional Reduction Algorithm for Learning from Demonstration Path Planning
Published 2025-03-01“…The results show that incorporating additional dimensions significantly enhances trajectory simplification while preserving key information. Additionally, the study highlights the importance of selecting appropriate encoding parameters to achieve optimal resolution. …”
Get full text
Article -
1571
Comparisons of performances of structural variants detection algorithms in solitary or combination strategy.
Published 2025-01-01“…Numerous algorithms for short-read SV detection exist, but none are universally optimal, each having limitations for specific SV sizes and types. …”
Get full text
Article -
1572
Optimization of costs in the enterprise. Effective strategies for business
Published 2021-04-01“…«The process of cost optimization cannot be started for a while and then stopped. …”
Get full text
Article -
1573
EGNAS: Efficient Graph Neural Architecture Search Through Evolutionary Algorithm
Published 2024-12-01Get full text
Article -
1574
Game and Application Purchasing Patterns on Steam using K-Means Algorithm
Published 2024-11-01“…The elbow method determines the optimal number of clusters, resulting in three clusters from the k-means algorithm. …”
Get full text
Article -
1575
Development and Evaluation of a Multi-Robot Path Planning Graph Algorithm
Published 2025-05-01“…The algorithm is suitable for identifying optimal and complete collision-free paths. …”
Get full text
Article -
1576
Precise Retrieval of Sentinel-1 Data by Minimizing the Redundancy With Greedy Algorithm
Published 2024-01-01“…Aiming to address this issue, we present here an optimized retrieval method grounded in a greedy algorithm, which can substantially reduce redundant data by approximately 20–65% while ensuring comprehensive data coverage over the areas of interest. …”
Get full text
Article -
1577
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures
Published 2025-07-01“…Experimental results show that the GABFT algorithm significantly improves system throughput and scalability while reducing latency and communication overhead, making it well-suited for large-scale networks.…”
Get full text
Article -
1578
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1579
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. …”
Get full text
Article -
1580
Key frame extraction algorithm for surveillance videos using an evolutionary approach
Published 2025-01-01“…Existing methods include the Adaptive Key Frame Extraction Algorithm, which reduces redundancy while ensuring maximum content coverage; the Optimal Key Frame Extraction Algorithm, which utilizes a Genetic Algorithm (GA) to select key frames optimally; and the Rapid Key Frame Extraction Algorithm, which employs clustering techniques to identify typical key frames. …”
Get full text
Article